2
MISSION BRIEF | FEDINSIDER.COM 4 Ways to Maintain A Strong Mobile Security Foundation W hen the pandemic struck, govern- ment agencies were struck with the question of how to maintain conti- nuity. Agencies quickly transitioned to a remote workforce. This included equip- ping employees with mobility tools like smartphones and laptops to enable them to work from home. But permitting employees to work remotely was only half the battle. The next question was how to protect those same employees, their devices and the data they gener- ate within this new remote environment. The answer was a concentration on getting an identity management strategy correct, while modifying and enhancing other existing security frameworks to work more efficiently with a remote workforce. Agencies have been operating under this mobile footing for over a year now, and have learned many important lessons about mobile cybersecurity. Three experts on the subject shared their thoughts and experiences during a recent FedInsider virtual panel. These are four of the key ideas they advocated. 1. Agencies Need to Fully Under- stand Their Frameworks to Support Proper Authentication Platforms When it comes to building mobile security foundations, it’s important to understand how to optimize all existing security protocols as well as how to incorporate various identity manage- ment functions. Examples of existing frameworks include the NIST Special Publication 800-157 guidelines, which outline the government’s Personal Identity Verification (PIV) system. This worked extremely well with Common Access Cards (CAC) in the physical environment, but needed modified for remote work. “A lot of agencies, especially larger ones, have been deploying derived PIV credentials,” said Ross Foard, Senior Engineer for the CDM Program at the Cybersecurity and Infrastructure Secu- rity Agency (CISA). “And that gave them a framework to continue to operate with a strong assurance credential even as they moved into the pandemic and to a more distributed working from home environment.” Foard said that other NIST frameworks also provided a good starting point for mobility security, such as Special Pub- lication 800-63-3, which looks at digital identity guidelines. Using that frame- work as a starting point, agencies have come up with alternative authentication methods that can be used to grant mobile workers access for specific purposes rather than the usual blanket authority provided by a PIV system. The pandemic has increased the need for these alternate authentications, and there is no indication that this need will change anytime soon, Foard noted. 2. Make Sure Your Environment Is Robust in Addition to Being Mobile It’s important to remember that the pandemic forced a sharp increase in the number of remote workers over a very a short period of time. This has presented problems with ensuring that mobility platforms could handle the same number of applications as agencies used prior to the pandemic. Agencies have had to quickly adapt solutions such as bolstering their avail- able VPN bandwidth and deactivating non-essential applications. Vincent Sritapan, Cyber QSMO Section Chief with CISA says that turning off non-essential features should not be huge deal for most agencies. Many times, their loss won’t even be noticed. “The truth is, you can always turn those features back on if people ask for them,” Sritapan said, “When enough people scream for something, then you’ll know.” Featuring: Identity Management is a Key to Securing Government Mobility Programs n Mark Azar IdAM Project Manager, The Efiia Group n Vincent Sritapan Cyber QSMO Section Chief, CISA n Ross Foard IT Specialist (INFOSEC), CISA

Mark Azar IdAM Project 4 Ways to Maintain The Efiia Group

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

M I S S I O N B R I E F | F E D I N S I D E R . C O M

4 Ways to Maintain A Strong Mobile Security Foundation

When the pandemic struck, govern-ment agencies were struck with

the question of how to maintain conti-nuity. Agencies quickly transitioned to a remote workforce. This included equip-ping employees with mobility tools like smartphones and laptops to enable them to work from home. But permitting employees to work remotely was only half the battle. The next question was how to protect those same employees, their devices and the data they gener-ate within this new remote environment.

The answer was a concentration on getting an identity management strategy correct, while modifying and enhancing other existing security frameworks to work more efficiently with a remote workforce. Agencies have been operating under this mobile footing for over a year now, and have learned many important lessons about mobile cybersecurity. Three experts on the subject shared their thoughts and experiences during a recent FedInsider virtual panel. These are four of the key ideas they advocated.

1. Agencies Need to Fully Under-stand Their Frameworks to Support Proper Authentication PlatformsWhen it comes to building mobile security foundations, it’s important to understand how to optimize all existing security protocols as well as how to

incorporate various identity manage-ment functions. Examples of existing frameworks include the NIST Special Publication 800-157 guidelines, which outline the government’s Personal Identity Verification (PIV) system. This worked extremely well with Common Access Cards (CAC) in the physical environment, but needed modified for remote work.

“A lot of agencies, especially larger ones, have been deploying derived PIV credentials,” said Ross Foard, Senior Engineer for the CDM Program at the Cybersecurity and Infrastructure Secu-rity Agency (CISA). “And that gave them a framework to continue to operate with a strong assurance credential even as they moved into the pandemic and to a more distributed working from home environment.”

Foard said that other NIST frameworks also provided a good starting point for mobility security, such as Special Pub-lication 800-63-3, which looks at digital identity guidelines. Using that frame-work as a starting point, agencies have come up with alternative authentication methods that can be used to grant mobile workers access for specific purposes rather than the usual blanket authority provided by a PIV system. The pandemic has increased the need for these alternate authentications,

and there is no indication that this need will change anytime soon, Foard noted.

2. Make Sure Your Environment Is Robust in Addition to Being MobileIt’s important to remember that the pandemic forced a sharp increase in the number of remote workers over a very a short period of time. This has presented problems with ensuring that mobility platforms could handle the same number of applications as agencies used prior to the pandemic. Agencies have had to quickly adapt solutions such as bolstering their avail-able VPN bandwidth and deactivating non-essential applications.

Vincent Sritapan, Cyber QSMO Section Chief with CISA says that turning off non-essential features should not be huge deal for most agencies. Many times, their loss won’t even be noticed. “The truth is, you can always turn those features back on if people ask for them,” Sritapan said, “When enough people scream for something, then you’ll know.”

Featuring:

Identity Management is a Key to Securing Government Mobility Programs

n Mark Azar IdAM Project Manager, The Efiia Group

n Vincent Sritapan Cyber QSMO

Section Chief, CISA

n Ross Foard IT Specialist

(INFOSEC), CISA

M I S S I O N B R I E F | F E D I N S I D E R . C O M

Each agency will have to remain vigi-lant about what programs and applica-tions it supports for its remote work-force. Not only will this save bandwidth, but it also will reduce the number of identities and access levels that need to be monitored.

3. Agencies Must Understand Security Standards Within Deployed FrameworksOne of the most important factors in im-plementing a successful mobile security foundation is maintaining compliance with established government standards. Agency officials need to understand exactly why architecting and developing solutions compliant to established stan-dards and guidance like NIST Special Publication 800-63-3 is so important.

“When it comes to identity, we specif-ically focus on mapping the intended use case to the proper assurance level within the NIST SP 800-63-3 guidelines themselves,” said Mark Azar, Identity and Access Manager Project Manager with the Efiia Group. “Identity, authenti-cation, and federation assurance levels are categorized as levels one, two, or three to provide increasing security controls to mitigate increasing risk for real-world implementation scenari-os.” The key is leveraging the correct assurance level in the right context, and understanding when to instill the proper security measures while still maintaining proper usability to ensure an intuitive user experience that we should all expect in 2021.

NIST defines an authenticator as-surance level (AAL) by the strength of the authentication process. It’s important that agencies understand not only their preferred AAL for each program, but also deploy it in a way that everything within their framework remains compliant per the established guidance. Azar notes that this is often fairly straightforward when dealing with local access. However, it gets a little more challenging for mobility programs because NIST has special AAL rules defined in NIST SP 800-157 that are tailored for smartphones and tablets running mobile operat-ing systems. But the good news is that there are many proven solutions readily available so you do not have to incur unnecessary risk when you go true-mobile.

4. Use Identity Management to Aim Towards Zero TrustSecurity in government is always a top priority, and identity management is good way to verify who is accessing agency resources. But it’s only one as-pect of security. The goal should be to use identity management to support a full zero trust program, where the least amount of access is given to each user, and only for the task at hand. This is even more important when working in a distributed mobile environment.

“Recently, we’ve made sure our clients adopt a zero trust model quickly as the modern workplace has changed,” said Azar. “Remote workers need to

safely access decentralized resources that are no longer just on-premise,” which makes a powerful framework like zero trust all the more critical in order to ensure security.

Azar’s employer, Efiia, has leveraged CompliantID, which includes SailPoint identity governance workflows for managing user access to applications protected by other cloud access management services. The solution enables government to engage with external stakeholders and citizens in real-time using a zero trust architec-ture, with support for single or multiple personas. CompliantID enables AAL2 and AAL3 multi-factor authentication, in alignment with guidance prescribed by NIST Special Publication 800-63-3.

Azar says that the old system of “trust but verify” isn’t strong enough anymore for government work. Agencies need to move to a zero trust policy which is based off “don’t trust, always verify.” The core principles of security such as least privilege and separation / segregation of duties are just as important as ever. Basic identity management is a great first step, but it’s only the foundation for zero trust networking in government.

© 2021 Hosky Communications, Inc. All rights reserved. FedInsider and the FedInsider logo, are trademarks or registered trademarks of Hosky Communications or its subsidiaries or affiliated companies in the United States and other countries. All other marks are the property of their respective owners.

Hosky Communications Inc.3811 Massachusetts Avenue, NWWashington, DC 20016

(202) 237-0300 [email protected] FedInsider.com @FedInsiderNews Linkedin.com/company/FedInsider @FedInsider

SailPoint11120 Four Points DriveAustin, TX 78726Contact: Cathy Cromley

(703) 517-4419 [email protected] Sailpoint.com/identity-for/government Facebook.com/SailPoint Linkedin.com/company/SailPoint-Technologies @SailPoint

Carahsoft1493 Sunset Hills RoadReston, VA 20190 Contact: Maggie Manfredi

(703) 230-7488 [email protected] Carahsoft.com/vendors/SailPoint Facebook.com/Carahsoft Linkedin.com/company/Carahsoft @Carahsoft